New information stealer targeting crypto-wallets

Doenerium Stealer masquerading as Windows Malicious Software Removal Tool

Cyble Research and Intelligence Labs (CRIL) spotted a malicious domain being used in a spear-phishing email campaign targeting Office365 users to steal credentials. The same domain was observed hosting multiple other malware variants, for example, a new stealer called “Doenerium stealer.”

Case 1:

The spear phishing email contains a link masquerading as a PDF attachment targeting Office365 users, as shown below.

Figure 1 – Malicious Link Embedded in Email

Once the user clicks on the link masquerading as a PDF attachment, it redirects them to the phishing page hxxps://neon[.]page/doc03565.

The attacker is running a phishing campaign to steal Microsoft Office 365 credentials. The following figure shows the phishing website used by the attacker.

Figure 2 – Phishing Websites used by the attacker

During the course of our research, we observed that the domain is malicious and hosting multiple malicious files. One such web page hxxps://neon[.]page/Microsoft-Windows-MSRT hosts a malicious stealer as a Microsoft Windows Malicious Software Removal Tool application.

Case 2:

Figure 3 – Website Hosting Stealer

There are two download links for the application, with both 32-bit and 64-bit versions available. However, both links host the same compressed folder with different names to appear genuine. The figure below shows the downloaded files.

Figure 4 – Malicious Files Hosted on the Website

The compressed folder contains a Windows executable and a Readme file. The file is named “Windows-KB890830-x64-V5.104.exe,” and the file’s icon is similar to the icon of Node JavaScript framework.

Figure 5 – Stealer File with Node JavaScript Icon

Further, we identified that the malicious file is an open-source stealer available on GitHub. The stealer is actively updating its capabilities and plans to add additional features such as Discord bot building, keylogging, Firefox stealer, etc. The figure below shows the GitHub page of the stealer.

Figure 6 – GitHub Page of Doenerium Stealer

The malicious file is unusually large and comes equipped with anti-sandbox and anti-analysis features, as well as the capability to establish persistence on the victim.

Technical Analysis

The file is a 64-bit Microsoft Visual C/C++ console-based Windows executable file with an unusually large file size of 102 MB.

The figure below shows the properties of the malicious”Windows-KB890830-x64-V5.104.exe” file.

Figure 7 – Doenerium Stealer Executable File Details

Upon investigating additional properties of the executable, we observed that the downloaded file is further masquerading as “Node.exe,” which is a Javascript framework, as shown below.

Figure 8 – Additional Properties of Doenerium Stealer

After execution, the malware performs malicious activities such as killing running processes, stealing data, monitoring clipboard data, monitoring system processes, etc. The following image shows the process tree of the Doenerium stealer.

Figure 9 – Process Tree of Doenerium Stealer

The malware then tries to perform privilege escalation using the RTLAdjustPrivilege() function, as shown below.

Figure 10 – Privilege Escalation Using RTLAdjustPrivilege()

After gaining access, the malware drops Node JavaScript Framework-related files in the Temp folder. These files are support files required to run the stealer in the background. The figure below shows the Node JS packages.

Figure 11 – Node JS-Related files dropped into the Temp Folder

Once the Node packages are dropped into the Temp folder, the malware checks for running processes to obstruct and prevent any analysis.

The malware then runs “cmd.exe” and executes the tasklist command to list currently running programs on the victim’s machine. The following command is used to list programs:

  • C:\Windows\system32\cmd.exe /d /s /c “tasklist”

The stealer contains a list of application names related to virtualization software and malware analysis tools. The malware checks and terminates these processes if they are found actively running on the victim’s machine. These applications are:


The malware kills these processes using the following command:

  • C:\Windows\system32\cmd.exe /d /s /c “taskkill /IM <Application Name> /F”

The figure below shows the malware using tasklist and taskkill commands to terminate any targeted applications.

Figure 12 – Stealer terminating applications

The stealer also has a list of PC names and hardware IDs to identify whether it is being run in a controlled environment. If the PC name and hardware ID are present in the list, then the stealer will terminate itself. The following are the two tables mentioning the PC names and hardware IDs.

PC Names:

WDAGUtilityAccountAbbyPeter Wilson

Hardware IDs:


After terminating the targeted processes, the malware drops itself as “Updater.exe”to the Start-up entry to establish persistence. The figure below shows the malware in the Start-up folder.

Figure 13 – Start-Up Entry to establish persistence

The stealer then starts an information-stealing operation in the infected system. The malware steals clipboard data if the data has cryptocurrency wallet addresses and replaces it with the attacker’s wallet address.

The stealer uses regex to find the wallet addresses in the clipboard. The figure below shows the routine to get clipboard data to carry out clipper operations.

Figure 14 – Routine for Clipper operation

After checking for clipboard data, the stealer looks for crypto wallet data in the system and steals it. The below figure shows the routine to find wallet data in the victim’s system.

Figure 15 – Routine to steal wallet data

The stealer looks for Discord tokens in various system locations. Figure 16 shows the routine to find Discord tokens stored across different browsers of the victim’s system.

Figure 16 – Routine to steal Discord Tokens

The malware also collects victims’ sensitive information, such as usernames, passwords, cookies, history, bookmarks, and user profiles from the installed browsers. The stealer targets the following browsers:

  • Google Chrome
  • Opera Stable
  • Brave Browser
  • Yandex
  • Microsoft Edge

The figure below shows the information targeted by the stealer that is present in the victim’s system.

Figure 17 – Routine to steal browser data

After stealing browser information, the malware steals system information such as CPU, Wi-Fi connections, RAM, Operating System version, host name, PC name, and processors. It then sends this information to the Command and Control (C&C) server. The figure below shows the routine to steal system information.

Figure 18 – Routine to steal System Information

Finally, the stolen artifacts are stored at the C:\Users\<Users>\AppData\Local folder location so that the malware can send it to the C&C server. The figure below shows the information collected by the stealer.

Figure 19 – Doenerium Stealer Collecting Information for exfiltration

After all the data is collected and stored in a specific “Local” folder, the malware compresses the data in a zip file and sends the zip file to the Discord webhook. The figure below shows the routine to send data to the C&C server.

Figure 20 – Routine to Create Zip File and Discord communication.


As a consequence of the rise in digital transactions and cryptocurrency usage, malware authors are continuously creating new stealers. The increasing use of digital currency incentivizes cyber criminals to steal funds from cryptocurrency users. This stolen data could then be used to commit financial fraud and stage other attacks.

There is a recent trend wherein the malware authors create GitHub pages, hosting malware builders. These open-source malware builders are upgraded with new features by TAs and are sold in cybercrime forums and markets.

MITRE ATT&CK® Techniques

TacticTechnique IDTechnique Name
ExecutionT1204.002User Execution: Malicious File
PersistenceT1547.001Boot or Logon AutoStart Execution: Registry Run Keys / Startup Folder
Privilege EscalationT1055Process Injection
Defense EvasionT1036Masquerading
Defense EvasionT1497Virtualization/Sandbox Evasion
DiscoveryT1057Process Discovery
Command and ControlT1071Application Layer Protocol

 Indicators Of Compromise (IOCs)

IndicatorsIndicator TypeDescription
9b4864d3de5fd251843d09bec1252befMD5Malicious node.exe
afaffc4c8c314249a0ce8017fcf9a549b2ac8337SHA1Malicious node.exe
609cccf310e725ba4ff4d74edffa0c33d4640f3c391dbbac4e1d00dd3f9c249eSHA256Malicious node.exe
f8ea2163d80aca793eefd7b2797f01e4MD5Malicious Zip
83ffbd5f4f4c2d1b681741d9f751105c4177fafdSHA1Malicious Zip
1b005dd76abc86ada724297b6698d3cbbe77f0bceb8fee41d9303114d689f609SHA256Malicious Zip
hxxps://neon[.]page/Microsoft-Windows-MSRTURLMalicious Domain
hxxps://neon[.]page/doc0365URLMalicious Link
Jaye8059.myportfolio[.]comDomainPhishing Webpage

Scroll to Top